65% had accepted positions with a competitor or started their own firm at the time of the theft,

54% used a network — email, a remote network access channel, or network file transfer — to send out stolen data, and

A majority had signed intellectual property agreements (which shows that policy is toothless without monitoring and enforcement).

Protecting sensitive data from security risks posed even by those who create it and use it presents an interesting security challenge — one that more and more compliance mandates demand be addressed.

Since sensitive data must be available to those who need to work with it, keeping that data secure means preventing its unauthorized distribution. This is what data loss prevention (DLP) technology accomplishes. DLP does this by discovering and identifying your sensitive data, then monitoring, controlling, and securing it wherever it may be and whenever it moves, both inside and outside your organization.